During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openssl | Openssl | 1.0.2 (including) | 1.0.2o (including) |
Openssl | Openssl | 1.1.0 (including) | 1.1.0h (including) |
JBoss Core Services Apache HTTP Server 2.4.29 SP2 | RedHat | openssl | * |
JBoss Core Services Apache HTTP Server 2.4.29 SP2 | RedHat | * | |
JBoss Core Services on RHEL 6 | RedHat | jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6 | * |
JBoss Core Services on RHEL 6 | RedHat | jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7 | * |
Red Hat Enterprise Linux 7 | RedHat | openssl-1:1.0.2k-16.el7 | * |
Red Hat OpenShift Application Runtimes Node.js 10 | RedHat | rhoar-nodejs-1:10.9.0-1.el7 | * |
Red Hat OpenShift Application Runtimes Node.js 8 | RedHat | rhoar-nodejs-1:8.11.4-2.el7 | * |
Openssl | Ubuntu | artful | * |
Openssl | Ubuntu | bionic | * |
Openssl | Ubuntu | cosmic | * |
Openssl | Ubuntu | devel | * |
Openssl | Ubuntu | disco | * |
Openssl | Ubuntu | trusty | * |
Openssl | Ubuntu | xenial | * |
Openssl098 | Ubuntu | trusty | * |
Openssl1.0 | Ubuntu | bionic | * |
Openssl1.0 | Ubuntu | cosmic | * |